A taxonomy and survey of attacks on digital signatures.
Jorge L. Hernandez-ArdietaAna Isabel González-Tablas FerreresJosé María de FuentesBenjamín RamosPublished in: Comput. Secur. (2013)
Keyphrases
- digital signature
- security mechanisms
- digital watermarking
- watermarking technique
- smart card
- resource constrained
- public key
- security issues
- elliptic curve
- watermarking scheme
- security protocols
- access control
- digital images
- security requirements
- signature scheme
- operating system
- copyright protection
- data hiding
- watermarking algorithm
- data integrity
- intrusion detection system